Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9
Научные статьи
В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Analysis and Detection of various DDoS attacks on Internet of Things Network
A Multiclass Approach to Estimating Software Vulnerability Severity Rating with Statistical and Word Embedding Methods
Secured Wireless Sensor Network Protocol using Rabin-assisted Multifactor Authentication
Role of Human Aspects on the process of Software Requirement Elicitation
K-Nearest Neighbors Bayesian Approach to False News Detection from Text on Social Media
Enhancing Security of Medical Image Data in the Cloud Using Machine Learning Technique
Methodology for Translation of Video Content Activates into Text Description: Three Object Activities Action
A Comparison of Opinion Mining Algorithms by Using Product Review Data
Development of an Interactive Dashboard for Analyzing Autism Spectrum Disorder (ASD) Data using Machine Learning
Quantitative Analysis of RFID based Vehicle Toll Collection System using UML and SPN
Incorporating Preference Changes through Users' Input in Collaborative Filtering Movie Recommender System
Care4Student: An Embedded Warning System for Preventing Abuse of Primary School Students
Implementation of Weighted Product Method for Evaluating Performance of Technicians
Hybridization of Buffalo and Truncative Cyclic Gene Deep Neural Network-based Test Suite Optimization for Software Testing
Deep Learning Network and Renyi-entropy Based Fusion Model for Emotion Recognition Using Multimodal Signals
A Theoretical Graph based Framework for Parameter Tuning of Multi-core Systems
A Performance Perspective of Live Migration of Virtual Machine in Cloud Data Center with Future Directions
Sensitive Data Identification and Security Assurance in Cloud and IoT based Networks
Detection of Unknown Insider Attack on Components of Big Data System: A Smart System Application for Big Data Cluster
Image Hashing Through Spatio-triad Relationship
Dynamic Editing Distance-based Extracting Relevant Information Approach from Social Networks
Performance Evaluation of Machine Learning-based Robocalls Detection Models in Telephony Networks
Neuro Fuzzy Model Based Routing Protocol in Mobile Ad-Hoc Networks
Synthesis of the Structure of a Computer System Functioning in Residual Classes
Threat Modelling and Detection Using Semantic Network for Improving Social Media Safety
A Secure and Efficient Cryptography System Based on Chaotic Maps for Securing Data Image in Fog Computing
Diagnosis of Skin Cancer Using Machine Learning and Image Processing Techniques
Augmented Reality and its Science
Intelligent Detection Technique for Malicious Websites Based on Deep Neural Network Classifier
Optimal and Appropriate Job Allocation Algorithm for Skilled Agents under a Server Constraint
High Accuracy Swin Transformers for Image-based Wafer Map Defect Detection
Deep Convolution Neural Networks for Cross-Dataset Facial Expression Recognition System
An Innovative Leukemia Detection System using Blood Samples via a Microscopic Accessory
Artificial Bee Colony Optimized Multi-Histogram Equalization for Contrast Enhancement and Brightness Preservation of Color Images
Patch Based Sclera and Periocular Biometrics Using Deep Learning
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods
Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance
A Modern Mechanism for Formal Analysis of Biometric Authentication Security Protocol
Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment
A lightweight Data Exchange Format for Mobile Transactions
← Предыдущая
Следующая страница →
1
|
...
|
66
|
67
|
68
|
69
|
70
|
71
|
72
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.